{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:18:19Z","timestamp":1761675499523},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002635"},{"type":"electronic","value":"9783540362319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36231-2_18","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T11:21:45Z","timestamp":1183375305000},"page":"215-233","source":"Crossref","is-referenced-by-count":17,"title":["Identity Based Authenticated Group Key Agreement Protocol"],"prefix":"10.1007","author":[{"given":"K. C.","family":"Reddy","sequence":"first","affiliation":[]},{"given":"Divya","family":"Nalla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,18]]},"reference":[{"key":"18_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"A one round protocol for tripartite Diffie-Hellman","author":"Joux","year":"2000","unstructured":"Joux.: A one round protocol for tripartite Diffie-Hellman. In W. Bosma, editor, Proceedings of Algorithmic Number Theory Symposium. ANTS IV, volume 1838 of Lecture notes in Computer Science, pages 385\u2013394, Springer-Verlag, 2000."},{"key":"18_CR2","volume-title":"Handbook of Applied Cryptography","author":"P.C. Oorschot Van","year":"1997","unstructured":"Menezes,P.C. Van Oorschot, and S. Vanstone.: Handbook of Applied Cryptography. CRC Press, Boca Raton, 1997."},{"key":"18_CR3","unstructured":"Menezes.: Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 2001."},{"key":"18_CR4","unstructured":"Shamir.: Identity based cryptosystems and signature schemes. Advances in Cryptology. Proceedings of Crypto\u201984."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Cocks.: An Identity based encryption scheme based on quadratic residues. Cryptography and Coding, 2001.","DOI":"10.1007\/3-540-45325-3_32"},{"key":"18_CR6","unstructured":"D.A. McGrew and A.T. Sherman.: Key establishment in large dynamic groups using one-way function trees. Manuscript, 1998."},{"key":"18_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology. CRYPTO 2001","author":"Boneh","year":"2001","unstructured":"Boneh and M. Franklin.: Identity-based encryption from the Weil Pairing. In Advances in Cryptology. CRYPTO 2001, Springer-Verlag LNCS 2139, 213\u2013229, 2001."},{"key":"18_CR8","unstructured":"Divya Nalla, K.C. Reddy.: ID-based tripartite Key Agreement protocol from pairings, Submitted."},{"key":"18_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"A secure and efficient conference Key distribution system","author":"M. Burmester","year":"1995","unstructured":"M. Burmester and Y. Desmedt.: A secure and efficient conference Key distribution system. In A. De Santis, editor, Advances in Cryptology EUROCRYPT\u2019 94, Workshop on the theory and Application of Cryptographic Techniques, volume 950 of Lecture notes in Computer Science, pages 275\u2013286, Springer-Verlag, 1995."},{"key":"18_CR10","series-title":"Technical Report","volume-title":"Authentication and public-key cryptosystems","author":"Merkle","year":"1979","unstructured":"Merkle, Ralph.C. Secrecy.: Authentication and public-key cryptosystems, Technical Report No. 1979-1, information systems laboratory, Stanford University (Palo Alto, CA, 1979)."},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"M. Steiner, G. Tsudik, and M. Waidner.: Key agreement in Dynamic Peer Groups, IEEE Transactions on Parallel and Distributed Systems, August 2000.","DOI":"10.1109\/71.877936"},{"key":"18_CR12","series-title":"Lect Notes Comput Sci","first-page":"481","volume-title":"Broadcast encryption","author":"Fiat","year":"1993","unstructured":"Fiat, Amor, andMoni Naor: Broadcast encryption, in Advances in Cryptology: Proceedings of Crypto 93, D.R. Stinson, ed., LNCS 773, Springer-Verlag (1993), 481\u2013491."},{"key":"18_CR13","unstructured":"N.P. Smart.: An Identity based authenticated Key Agreement protocol based on the Weil Pairing. Cryptology ePrint Archive, Report 2001\/111, 2001. http:\/\/eprint.iacr.org\/ ."},{"key":"18_CR14","unstructured":"R. Sakai, K. Ohgishi, and M. Kasahara: Cryptosystems based on pairings. In SCIS 2000, 2000."},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Sattam S. Al-Riyami, Kenneth G. Paterson: Authenticated Three Party Key Agreement Protocols from Pairings, Information security group, Royal Holloway, University of London, March 2002.","DOI":"10.1007\/978-3-540-40974-8_27"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Y. Kim, A. Perrig, and G. Tsudik: Communication-efficient group key agreement. In Information systems Security, Proceedings of the 17th International Information Security Conference IFIP SEC\u201901, 2001.","DOI":"10.1007\/0-306-46998-7_16"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Y. Kim, A. Perrig, and G. Tsudik.: Simple and fault tolerant key agreement for dynamic collaborative groups, in Proceedings of 7 th ACM Conference on Computer and Communications Security, pp. 235\u2013244, ACM Press, November 2000.","DOI":"10.1145\/352600.352638"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36231-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T21:26:32Z","timestamp":1556573192000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36231-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002635","9783540362319"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-36231-2_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}